source: MILK/trunk/milk_server/ndgDiscovery.config @ 4466

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/MILK/trunk/milk_server/ndgDiscovery.config@4466
Revision 4466, 10.7 KB checked in by cbyrom, 11 years ago (diff)

Strip out code not relevant to MILK - mainly WCS and WMS stuff - also including the CSML server code + trackback code
Also tidy up structure of 'public' dir - setting up new 'style' dir and
centralising icons in icons dir + remove all unused icons, javascript and stylesheets.
Also strip out testcase code and populate new test directory structure.

Line 
1#
2# NDG Configuration File
3# At deployment time the only pieces that a user ought to need to customise
4# will be
5#    - the server address
6#    - it might be necessary to customise the location of the layout directory
7#    - the localLink, localImage and localAlt in the [layout] section
8#
9[DEFAULT]
10#
11# the following is the server on which this browse/discovery instance runs!
12server:         http://localhost
13#server:       http://superglue.badc.rl.ac.uk:8083
14## This is the proxied server root
15#server: http://superglue.badc.rl.ac.uk/ndg-test
16
17#
18# the following is the server on which the NDG discovery service is running! (Not to be confused with
19# the server on which the NDG discovery web service is running). This can and probably should be the local
20# server (i.e. don't change it!)
21#
22ndgServer:      %(server)s
23#
24##!NOTE: These are changed to  reflect the proxy prefix
25#layout:         /ndg-test/layout/
26#icondir:        /ndg-test/layout/icons/
27layout:          /layout/
28icondir:         /layout/icons/
29
30#
31mailserver:       xxxoutbox.rl.ac.uk
32metadataMaintainer: b.n.lawrence@rl.ac.uk
33repository:        %(server)s
34tbrecipient:      b.n.lawrence@rl.ac.uk
35
36# The following should only be needed for debugging some parts of the code when running on sandboxes behind a firewall
37proxyServer:      http://wwwcache3.rl.ac.uk:8080/
38disclaimer:       
39
40[SEARCH]
41advancedURL:        %(ndgServer)s/discovery
42discoveryURL:       %(ndgServer)s/discovery
43helpURL:            %(ndgServer)s/discovery?help=1
44
45[logging]
46debuglog:        discovery.log
47
48[layout]
49###### user customisable:
50localLink:      %(ndgServer)s/layout/
51localImage:     %(icondir)sndg_logo_circle.gif
52localAlt:       visit badc
53###### ought to be the end of the customisations
54ndgLink:        http://ndg.nerc.ac.uk/
55ndgImage:       %(icondir)sndg_logo_circle.gif
56ndgAlt:         visit ndg
57stfcLink:       http://ceda.stfc.ac.uk/
58stfcImage:      %(icondir)sstfc-circle-sm.gif
59key:            %(icondir)spadlock.png
60Xicon:          %(icondir)sxml.png
61plot:           %(icondir)splot.png
62printer:        %(icondir)sprinter.png
63helpIcon:       %(icondir)shelp.png
64HdrLeftAlt:     %(icondir)s Natural Environment Research Council
65HdrLeftLogo:    %(icondir)sNERC_Logo.gif
66navMinus:       %(icondir)snavigate_minus.png
67navPlus:                %(icondir)snavigate_plus.png
68
69pageLogo:       %(layout)s20050502_albert-park_silhouetted-trees-and-clouds_02_cropped.jpg
70
71[HELP]
72helpFile:       %(layout)shelp.html
73
74[ATOM_EDITOR]
75# if set to True, errors output with stacktrace to templates
76debug: True             
77
78[NDG_A_SERVICE]
79badc.nerc.ac.uk: http://glue.badc.rl.ac.uk/cgi-bin/dxui
80icon: %(icondir)splot.png
81#%(icondir)sdata_aservice.png
82icon_alt: A Service
83service_name: A
84icon_title: LINKS to a DATA BROWSE view of this dataset
85instance: datasetURI_%s
86
87[NDG_B_SERVICE]
88#
89#These are the hosts which are publicly available on which the browse
90#service is running. The list should be of the form repository: hostname
91#where repository is the NDG identifier ....
92#
93neodc.nerc.ac.uk: %(server)s
94badc.nerc.ac.uk: %(server)s
95www.npm.ac.uk: http://wwwdev.neodaas.ac.uk/projects/ndg
96grid.bodc.nerc.ac.uk: http://grid.bodc.nerc.ac.uk
97ndg.noc.soton.ac.uk: http://ndg.noc.soton.ac.uk:8001
98icon: %(icondir)sbrowse_bservice.png
99icon_alt: B Service
100icon_title: Links to a METADATA BROWSE view of this dataset
101service_name: B
102instance: SERVICEHOST/view/URI
103
104[NDG_EXIST]
105#
106# following is a list of repository servers, actually only one is needed,
107# at any one location running browse, and that is the local one. The
108# entire purpose of the rest of the list is to simplify updates. These
109# hosts do not need to be visible outside of corporate firewalls.
110# The list should be of the form repository: hostname where repository
111# is the NDG identifier.
112#
113local: chinook.badc.rl.ac.uk
114badc.nerc.ac.uk: chinook.badc.rl.ac.uk
115neodc.nerc.ac.uk: chinook.badc.rl.ac.uk
116grid.bodc.nerc.ac.uk: grid.bodc.nerc.ac.uk
117ndg.noc.soton.ac.uk: ndg.noc.soton.ac.uk
118www.npm.ac.uk: pgsql.npm.ac.uk
119passwordFile: ./passwords.txt
120
121#
122# NDG Security
123#
124
125# Security settings for configuration as a client to a Single Sign On Service
126# i.e. Where Are You From, login and logout operations are handled by a
127# separate standalone paster instance
128#[NDG_SECURITY.ssoClient]
129## THIS service's address for secure connections - the Single Sign On service
130## returns security parameters to this service along this channel
131#sslServer: https://localhost
132##sslServer: https://ndgbeta.badc.rl.ac.uk
133#
134## THIS service's address for unencrypted connections - when login is complete,
135## the BaseController redirects to an equivalent address under this host name.
136## sslServer and server settings must match for the sharing of cookies.
137#server: http://localhost
138#
139## WAYF running on Single Sign On Service - omit to default to WAYF running on
140## THIS paster instance
141#wayfURI:               https://localhost/sso/wayf
142#
143## Logout URI running on Single Sign On Service - omit to default to logout
144## running on THIS paster instance
145#logoutURI:             https://localhost/sso/logout
146
147# Security settings for running a Single Sign On Service from this paster
148# instance.  Either NDG_SECURITY.ssoClient or NDG_SECURITY.ssoService sections
149# should be set but NOT both
150
151# Single Sign On Service Settings
152[NDG_SECURITY.ssoService]
153
154# THIS service's address for secure connections - the Single Sign On service
155# returns security parameters to this service along this channel
156sslServer: https://localhost
157#sslServer: https://ndgbeta.badc.rl.ac.uk
158
159# THIS service's address for unencrypted connections - when login is complete,
160# the BaseController redirects to an equivalent address under this host name.
161# sslServer and server settings must match for the sharing of cookies.
162server: http://localhost
163
164enableOpenID: True
165
166# Redirect SOAP output to a file e.g. open(<somefile>, 'w')
167tracefile: None
168#tracefile: sys.stderr
169
170# Service addresses
171sessionMgrURI: https://localhost/SessionManager
172#sessionMgrURI: https://ndgbeta.badc.rl.ac.uk/SessionManager
173attAuthorityURI: http://localhost:5000/AttributeAuthority
174#attAuthorityURI: http://aa.ceda.rl.ac.uk
175
176# SSL Connections
177#
178# Space separated list of CA cert. files.  The peer cert.
179# must verify against at least one of these otherwise the connection is
180# dropped.  Include CA certs for all the sites trusted
181sslCACertFilePathList: certs/ndg-test-ca.crt
182
183# Web Services HTTP Proxy fine tuning
184#
185# For most situations, these settings can be ignored and instead make use of
186# the http_proxy environment variable.  They allow for the case where specific
187# settings are needed just for the security web services calls
188
189# Overrides the http_proxy environment variable setting - may be omitted
190#httpProxyHost: wwwcache.rl.ac.uk:8080
191
192# Web service clients pick up the no_proxy environment variable setting by
193# default.  Set this parameter to override no_proxy for web service
194# connections. 
195#noHttpProxyList: localhost, 127.0.0.1
196
197# WS-Security signature handler - set a config file with 'wssCfgFilePath'
198# or omit and put the relevant content directly in here under
199# 'NDG_SECURITY.wssecurity' section
200#wssCfgFilePath: wssecurity.cfg
201
202[NDG_SECURITY.wssecurity]
203
204# Settings for signature of an outbound message ...
205
206# Certificate associated with private key used to sign a message.  The sign
207# method will add this to the BinarySecurityToken element of the WSSE header. 
208# binSecTokValType attribute must be set to 'X509' or 'X509v3' ValueType. 
209# As an alternative, use 'signingCertChain' parameter
210
211# file path PEM encoded cert
212signingCertFilePath=certs/clnt.crt
213
214# file path to PEM encoded private key file
215signingPriKeyFilePath=certs/clnt.key
216
217# Password protecting private key.  Leave blank if there is no password.
218signingPriKeyPwd=
219
220# Provide a space separated list of file paths.  CA Certs should be included
221# for all the sites this installation trusts
222caCertFilePathList=certs/ndg-test-ca.crt
223
224# Set the ValueType for the BinarySecurityToken added to the WSSE header for a
225# signed message. 
226reqBinSecTokValType=X509v3
227
228# Add a timestamp element to an outbound message
229addTimestamp=True
230
231# For WSSE 1.1 - service returns signature confirmation containing signature
232# value sent by client
233applySignatureConfirmation=False
234
235#
236# Gatekeeper settings
237#
238[NDG_SECURITY.gatekeeper]
239#
240# Policy Enforcement Point calls a Policy Decision Point interface:
241
242# File path to Python module containing the PDP class - leave blank if the
243# module is in PYTHONPATH env var
244pdpModFilePath:
245
246# Name of PDP Python module
247pdpModName: ndg.security.common.authz.pdp.browse
248
249# Name of PDP class used
250pdpClassName: BrowsePDP
251
252# File Path to configuration file used by PDP class (environment variables
253# can be used in this path e.g. $PDP_CONFIG_DIR/pdp.cfg.  Omit this parameter
254# to make the PEP read the PDP settings from THIS config file
255#pdpCfgFilePath:
256
257# Read PDP params from THIS section
258pdpCfgSection: NDG_SECURITY.gatekeeper
259
260#
261# Settings for Policy Decision Point called by the PEP
262
263# Address of Attribute Authority for Data Provider
264#aaURI: http://aa.ceda.rl.ac.uk
265aaURI: http://localhost:5000/AttributeAuthority
266
267# Verify peer cert for SSL connections to Session Manager
268sslCACertFilePathList: certs/ndg-test-ca.crt
269
270# Set to file object to dump SOAP message output for debugging
271tracefile:
272
273# CA certificates used to verify the signature of user Attribute Certificates
274# - space delimited list but note that currently only the CA of this site
275# is needed because only mapped Attribute Certificates may be accepted.
276acCACertFilePathList: certs/ndg-test-ca.crt
277
278# X.509 Distinguished Name for Attribute Certificate issuer - should match with
279# the issuer element of the users Attribute Certificate submitted in order to
280# gain access
281acIssuer: /CN=AttributeAuthority/O=NDG Security Test/OU=Site A
282#acIssuer: /CN=AttributeAuthority/O=NDG/OU=BADC
283
284# WS-Security signature handler - set a config file with 'wssCfgFilePath'
285# or omit and put the relevant content directly in here under the section name
286# specified by 'wssCfgSection' below
287#wssCfgFilePath: wssecurity.cfg
288
289# Config file section for WS-Security settings - Nb. the gatekeeper shares the
290# same settings as the Single Sign On Service.
291wssCfgSection: NDG_SECURITY.wssecurity
292
293[RELATED]
294icon: %(icondir)srelated_link.png
295icon_alt: Related
296service_name: Related
297icon_title: Links to a RELATED URL
298instance: uri
299
300[DISCOVERY]
301icon: %(icondir)scatalogue_dservice.png
302icon_alt: Catalogue
303service_name: Catalogue
304default: %(server)s
305formatDefault=DIF
306icon_title: Links to the DISCOVERY RECORD for this dataset
307#standalone: True
308standalone: False
309#NB, if unset, this will default to the discovery service at ndg.badc.rl.ac.uk
310#discoveryServiceURL:http://localhost:8080/axis2/services/DiscoveryService
311
312[MILK_SERVER]
313#
314# Configure the MILK_SERVER framework here
315#
316
317# exception_type: whether OGC servers should send a valid ExceptionReport on errors
318#     or use pylon's debugger.  Very useful for debugging OWS controllers.  Default is ogc
319#exception_type: ogc
320#exception_type: pylons
321
Note: See TracBrowser for help on using the repository browser.